Author: kumar Pratik

Admission Controller in Kubernetes

Reading Time: 4 minutes In this blog we are going to talk about admission controllers, how they interact with Kubernetes and what they can do for us. Well, I want to start by just sort of diagramming out what a request looks like when it comes into Kubernetes. There are basically three parts. First obviously the person or potential automation that is making the API call that goes to Continue Reading

Workspaces in Terraform

Reading Time: 3 minutes What Terraform Workspaces are? Terraform supports two concepts of workspaces: CLI workspace and Terraform Cloud/Enterprise workspace. This article is focused on CLI Workspaces also known as OSS Workspace. CLI workspaces are a feature that allows us to manage a single Terraform configuration and provision the resulting resources different time.This allows us to have similar group of resources without managing multiple stacks. To use CLI workspaces, we Continue Reading

MYSQL REPLICATION

Reading Time: 4 minutes MySQL replication is the continuous copying of data changes from one database (primary) to another database (replica). The two databases are generally located on different physical servers. The replica database can act as a read replica or a standby replica to provide failover capability. Generally, there are two ways of replication: Asynchronous Replication Synchronous Replication Synchronous vs. asynchronous replication The primary difference between synchronous replication Continue Reading

Introduction to GNU Parallel

Reading Time: 2 minutes When you run commands on Linux, be they one at a time at the prompt or from a bash script, those commands run in sequence. The first command runs, followed by the second, followed by the third. Granted, the time between commands is so minuscule, the naked eye wouldn’t notice. For some instances, that may not be the most efficient means of running commands. If Continue Reading

Asymmetric Encryption

Reading Time: 3 minutes If used correctly, end-to-end encryption can help protect the contents of your messages, text, and even files from being understood by anyone except their intended recipients. It can also be used to prove that a message came from a particular person and has not been altered What does encryption do? A clear readable message is encrypted into a scrambled message. The scrambled message is sent Continue Reading

BIOS vs UEFI

UEFI v/s BIOS

Reading Time: 3 minutes BIOS and UEFI are two of a kind, but completely different from each other. They serve one major purpose: booting the machine and they do it in different ways and with different options. Without them, all your hardware and the very machine you’re reading this blog on, wouldn’t even start. But what are the differences? And why are they mutually exclusive? BIOS BIOS stands for Continue Reading